Sciweavers

38 search results - page 4 / 8
» fc 2005
Sort
View
FC
2006
Springer
139views Cryptology» more  FC 2006»
13 years 11 months ago
Defeating Malicious Servers in a Blind Signatures Based Voting System
In this paper, we present two failures in the blind signatures based voting system Votopia [2] which has been tested during the last World Soccer Cup. We then propose a fix which r...
Sébastien Canard, Matthieu Gaud, Jacques Tr...
ACNS
2006
Springer
112views Cryptology» more  ACNS 2006»
14 years 1 months ago
Password Based Server Aided Key Exchange
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient t...
Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
FC
2008
Springer
81views Cryptology» more  FC 2008»
13 years 9 months ago
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
At Oakland 2005, Murdoch and Danezis described an attack on the Tor anonymity service that recovers the nodes in a Tor circuit, but not the client. We observe that in a peer-to-pee...
Jon McLachlan, Nicholas Hopper
CP
2005
Springer
14 years 29 days ago
Solving the Car-Sequencing Problem as a Non-binary CSP
A search algorithm based on non-binary forward checking (nFC) is used to solve the car-sequencing problem. The choice of value ordering heuristics having a dramatic effect on solu...
Mihaela Butaru, Zineb Habbas
FC
2005
Springer
133views Cryptology» more  FC 2005»
14 years 29 days ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin